Server-Side Request Forgery (SSRF) Affecting org.apache.solr:solr-core package, versions [,8.8.2)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESOLR-1245056
- published 13 Apr 2021
- disclosed 13 Apr 2021
- credit Caolinhong (Skay)
Introduced: 13 Apr 2021
CVE-2021-27905 Open this link in a new tabHow to fix?
Upgrade org.apache.solr:solr-core
to version 8.8.2 or higher.
Overview
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). The ReplicationHandler
(normally registered at /replication
under a Solr
core) has a masterUrl
(also leaderUrl
alias) parameter that is used to designate another ReplicationHandler
on another Solr
core to replicate index data into the local core.
These parameters are not checked against a similar configuration it uses for the shards
parameter.